/macosx-10.9.5/mail_cmds-29/mail/ |
H A D | quit.c | 78 FILE *ibuf = NULL, *obuf = NULL, *fbuf, *rbuf, *readstat = NULL, *abuf; local 211 (obuf = Fdopen(fd, "w")) == NULL) { 219 (void)Fclose(obuf); 226 (void)putc(c, obuf); 229 if (ferror(obuf)) { 232 (void)Fclose(obuf); 236 (void)Fclose(obuf); 238 if ((obuf = Fopen(mbox, "r+")) == NULL) { 246 if ((obuf = Fopen(mbox, "a")) == NULL) { 251 (void)fchmod(fileno(obuf), 060 346 FILE *obuf; local 399 FILE *obuf, *ibuf, *readstat = NULL; local [all...] |
H A D | send.c | 61 sendmessage(mp, obuf, doign, prefix) 63 FILE *obuf; 111 statusput(mp, obuf, prefix); 140 statusput(mp, obuf, prefix); 145 (void)putc('\n', obuf); 163 statusput(mp, obuf, prefix); 181 fputs(prefix, obuf); 184 prefixlen, obuf); 186 (void)fwrite(line, sizeof(*line), length, obuf); 187 if (ferror(obuf)) [all...] |
H A D | cmd1.c | 307 FILE *obuf; local 309 obuf = stdout; 323 obuf = Popen(cp, "w"); 324 if (obuf == NULL) { 326 obuf = stdout; 341 fprintf(obuf, "Message %d:\n", *ip); 342 (void)sendmessage(mp, obuf, doign ? ignore : 0, NULL); 346 if (obuf != stdout) { 351 (void)Pclose(obuf);
|
H A D | cmd2.c | 204 FILE *obuf; local 242 if ((obuf = Fopen(file, "a")) == NULL) { 249 if (sendmessage(mp, obuf, ignore, NULL) < 0) { 251 (void)Fclose(obuf); 257 (void)fflush(obuf); 258 if (ferror(obuf)) 260 (void)Fclose(obuf);
|
H A D | fio.c | 172 putline(obuf, linebuf, outlf) 173 FILE *obuf; 180 (void)fwrite(linebuf, sizeof(*linebuf), c, obuf); 182 fprintf(obuf, "\n"); 185 if (ferror(obuf))
|
/macosx-10.9.5/curl-78.94.1/curl/lib/ |
H A D | base64.c | 164 unsigned char obuf[4]; local 209 obuf[0] = (unsigned char) ((ibuf[0] & 0xFC) >> 2); 210 obuf[1] = (unsigned char) (((ibuf[0] & 0x03) << 4) | \ 212 obuf[2] = (unsigned char) (((ibuf[1] & 0x0F) << 2) | \ 214 obuf[3] = (unsigned char) (ibuf[2] & 0x3F); 219 table64[obuf[0]], 220 table64[obuf[1]]); 224 table64[obuf[0]], 225 table64[obuf[1]], 226 table64[obuf[ [all...] |
/macosx-10.9.5/text_cmds-87/ul/ |
H A D | ul.c | 85 struct CHAR obuf[MAXBUF]; variable in typeref:struct:CHAR 242 if (obuf[col].c_char || obuf[col].c_width < 0) { 243 while (col > 0 && obuf[col].c_width < 0) 245 w = obuf[col].c_width; 247 obuf[col++].c_mode |= UNDERL | mode; 252 obuf[col].c_char = '_'; 253 obuf[col].c_width = 1; 273 if (obuf[col].c_char == '\0') { 274 obuf[co [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/ |
H A D | example_evp_cipher.c | 70 void *ibuf, *obuf; local 112 obuf = malloc(block_size + EVP_CIPHER_block_size(c)); 124 ret = EVP_CipherUpdate(&ctx, obuf, &olen, ibuf, ilen); 130 fwrite(obuf, 1, olen, out); 136 ret = EVP_CipherFinal_ex(&ctx, obuf, &olen); 142 fwrite(obuf, 1, olen, out);
|
/macosx-10.9.5/Heimdal-323.92.1/appl/telnet/telnet/ |
H A D | network.c | 49 void *obuf, *ibuf; local 51 if ((obuf = malloc(netobufsize)) == NULL) 56 if (ring_init(&netoring, obuf, netobufsize) != 1) {
|
/macosx-10.9.5/less-23/less/ |
H A D | output.c | 77 static char obuf[OUTBUF_SIZE]; variable 78 static char *ob = obuf; 102 n = ob - obuf; 110 _outtext(obuf); 111 ob = obuf; 120 WIN32textout(obuf, ob - obuf); 150 for (anchor = p_next = obuf; 201 strcpy(obuf, anchor); 202 ob = &obuf[slo [all...] |
/macosx-10.9.5/Libc-997.90.3/net/FreeBSD/ |
H A D | linkaddr.c | 127 static char obuf[64]; local 128 char *out = obuf; 135 bcopy(sdl->sdl_data, obuf, sdl->sdl_nlen); 155 return (obuf);
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/libdes/src/ |
H A D | des.c | 384 /* crypto/des/des.c */
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
* All rights reserved.
*
* This package is an SSL implementation written
* by Eric Young (eay@mincom.oz.au).
* The implementation was written so as to conform with Netscapes SSL.
*
* This library is free for commercial and non-commercial use as long as
* the following conditions are aheared to. The following conditions
* apply to all code found in this distribution, be it the RC4, RSA,
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
* included with this distribution is covered by the same copyright terms
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
*
* Copyright remains Eric Young's, and as such any Copyright notices in
* the code are not to be removed.
* If this package is used in a product, Eric Young should be given attribution
* as the author of the parts of the library used.
* This can be in the form of a textual message at program startup or
* in documentation (online or textual) provided with the package.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young (eay@mincom.oz.au)"
* The word 'cryptographic' can be left out if the rouines from the library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
* the apps directory (application code) you must include an acknowledgement:
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif
#ifdef HAVE_IO_H
#include <io.h>
#endif
#include <time.h>
#include "des_ver.h"
#ifdef VMS
#include <types.h>
#include <stat.h>
#endif
#ifdef HAVE_SYS_TYPES_H
#include <sys/types.h>
#endif
#ifdef HAVE_SYS_STAT_H
#include <sys/stat.h>
#endif
#include "des.h"
#ifndef HAVE_RANDOM
#define random rand
#define srandom(s) srand(s)
#endif
#ifndef NOPROTO
void usage(void);
void doencryption(void);
int uufwrite(unsigned char *data, int size, unsigned int num, FILE *fp);
void uufwriteEnd(FILE *fp);
int uufread(unsigned char *out,int size,unsigned int num,FILE *fp);
int uuencode(unsigned char *in,int num,unsigned char *out);
int uudecode(unsigned char *in,int num,unsigned char *out);
#else
void usage();
void doencryption();
int uufwrite();
void uufwriteEnd();
int uufread();
int uuencode();
int uudecode();
#endif
#ifdef VMS
#define EXIT(a) exit(a&0x10000000)
#else
#define EXIT(a) exit(a)
#endif
#define BUFSIZE (8*1024)
#define VERIFY 1
#define KEYSIZ 8
#define KEYSIZB 1024 /* should hit tty line limit first :-) */
char key[KEYSIZB+1];
int do_encrypt,longk=0;
FILE *DES_IN,*DES_OUT,*CKSUM_OUT;
char uuname[200];
unsigned char uubuf[50];
int uubufnum=0;
#define INUUBUFN (45*100)
#define OUTUUBUF (65*100)
unsigned char b[OUTUUBUF];
unsigned char bb[300];
des_cblock cksum={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};
char cksumname[200]="";
int vflag,cflag,eflag,dflag,kflag,bflag,fflag,sflag,uflag,flag3,hflag,error;
int main(argc, argv)
int argc;
char **argv;
{
int i;
struct stat ins,outs;
char *p;
char *in=NULL,*out=NULL;
vflag=cflag=eflag=dflag=kflag=hflag=bflag=fflag=sflag=uflag=flag3=0;
error=0;
memset(key,0,sizeof(key));
for (i=1; i<argc; i++)
{
p=argv[i];
if ((p[0] == '-') && (p[1] != '\0'))
{
p++;
while (*p)
{
switch (*(p++))
{
case '3':
flag3=1;
longk=1;
break;
case 'c':
cflag=1;
strncpy(cksumname,p,200);
p+=strlen(cksumname);
break;
case 'C':
cflag=1;
longk=1;
strncpy(cksumname,p,200);
p+=strlen(cksumname);
break;
case 'e':
eflag=1;
break;
case 'v':
vflag=1;
break;
case 'E':
eflag=1;
longk=1;
break;
case 'd':
dflag=1;
break;
case 'D':
dflag=1;
longk=1;
break;
case 'b':
bflag=1;
break;
case 'f':
fflag=1;
break;
case 's':
sflag=1;
break;
case 'u':
uflag=1;
strncpy(uuname,p,200);
p+=strlen(uuname);
break;
case 'h':
hflag=1;
break;
case 'k':
kflag=1;
if ((i+1) == argc)
{
fputs("must have a key with the -k option\n",stderr);
error=1;
}
else
{
int j;
i++;
strncpy(key,argv[i],KEYSIZB);
for (j=strlen(argv[i])-1; j>=0; j--)
argv[i][j]='\0';
}
break;
default:
fprintf(stderr,"'%c' unknown flag\n",p[-1]);
error=1;
break;
}
}
}
else
{
if (in == NULL)
in=argv[i];
else if (out == NULL)
out=argv[i];
else
error=1;
}
}
if (error) usage();
/* We either
* do checksum or
* do encrypt or
* do decrypt or
* do decrypt then ckecksum or
* do checksum then encrypt
*/
if (((eflag+dflag) == 1) || cflag)
{
if (eflag) do_encrypt=DES_ENCRYPT;
if (dflag) do_encrypt=DES_DECRYPT;
}
else
{
if (vflag)
{
#ifndef _Windows
fprintf(stderr,"des(1) built with %s\n",libdes_version);
#endif
EXIT(1);
}
else usage();
}
#ifndef _Windows
if (vflag) fprintf(stderr,"des(1) built with %s\n",libdes_version);
#endif
if ( (in != NULL) &&
(out != NULL) &&
#ifndef MSDOS
(stat(in,&ins) != -1) &&
(stat(out,&outs) != -1) &&
(ins.st_dev == outs.st_dev) &&
(ins.st_ino == outs.st_ino))
#else /* MSDOS */
(strcmp(in,out) == 0))
#endif
{
fputs("input and output file are the same\n",stderr);
EXIT(3);
}
if (!kflag)
if (des_read_pw_string(key,KEYSIZB+1,"Enter key:",eflag?VERIFY:0))
{
fputs("password error\n",stderr);
EXIT(2);
}
if (in == NULL)
DES_IN=stdin;
else if ((DES_IN=fopen(in,"r")) == NULL)
{
perror("opening input file");
EXIT(4);
}
CKSUM_OUT=stdout;
if (out == NULL)
{
DES_OUT=stdout;
CKSUM_OUT=stderr;
}
else if ((DES_OUT=fopen(out,"w")) == NULL)
{
perror("opening output file");
EXIT(5);
}
#ifdef MSDOS
/* This should set the file to binary mode. */
{
#include <fcntl.h>
if (!(uflag && dflag))
setmode(fileno(DES_IN),O_BINARY);
if (!(uflag && eflag))
setmode(fileno(DES_OUT),O_BINARY);
}
#endif
doencryption();
fclose(DES_IN);
fclose(DES_OUT);
EXIT(0);
}
void usage()
{
char **u;
static const char *Usage[]={
"des <options> [input-file [output-file]]",
"options:",
"-v : des(1) version number",
"-e : encrypt using sunOS compatible user key to DES key conversion.",
"-E : encrypt ",
"-d : decrypt using sunOS compatible user key to DES key conversion.",
"-D : decrypt ",
"-c[ckname] : generate a cbc_cksum using sunOS compatible user key to",
" DES key conversion and output to ckname (stdout default,",
" stderr if data being output on stdout). The checksum is",
" generated before encryption and after decryption if used",
" in conjunction with -[eEdD].",
"-C[ckname] : generate a cbc_cksum as for -c but compatible with -[ED].",
"-k key : use key 'key'",
"-h : the key that is entered will be a hexidecimal number",
" that is used directly as the des key",
"-u[uuname] : input file is uudecoded if -[dD] or output uuencoded data if -[eE]",
" (uuname is the filename to put in the uuencode header).",
"-b : encrypt using DES in ecb encryption mode, the defaut is cbc mode.",
"-3 : encrypt using tripple DES encryption. This uses 2 keys",
" generated from the input key. If the input key is less",
" than 8 characters long, this is equivelent to normal",
" encryption. Default is tripple cbc, -b makes it tripple ecb.",
NULL
};
for (u=(char **)Usage; *u; u++)
{
fputs(*u,stderr);
fputc('\n',stderr);
}
EXIT(1);
}
void doencryption()
{
#ifdef _LIBC
extern int srandom();
extern int random();
extern unsigned long time();
#endif
register int i;
des_key_schedule ks,ks2;
unsigned char iv[8],iv2[8];
char *p;
int num=0,j,k,l,rem,ll,len,last,ex=0;
des_cblock kk,k2;
FILE *O;
int Exit=0;
#ifndef MSDOS
static unsigned char buf[BUFSIZE+8],obuf[BUFSIZE+8];
#else
static unsigned char *buf=NULL,*obuf=NULL;
if (buf == NULL)
{
if ( (( buf=(unsigned char *)Malloc(BUFSIZE+8)) == NULL) ||
((obuf=(unsigned char *)Malloc(BUFSIZE+8)) == NULL))
{
fputs("Not enough memory\n",stderr);
Exit=10;
goto problems;
}
}
#endif
if (hflag)
{
j=(flag3?16:8);
p=key;
for (i=0; i<j; i++)
{
k=0;
if ((*p <= '9') && (*p >= '0'))
k=(*p-'0')<<4;
else if ((*p <= 'f') && (*p >= 'a'))
k=(*p-'a'+10)<<4;
else if ((*p <= 'F') && (*p >= 'A'))
k=(*p-'A'+10)<<4;
else
{
fputs("Bad hex key\n",stderr);
Exit=9;
goto problems;
}
p++;
if ((*p <= '9') && (*p >= '0'))
k|=(*p-'0');
else if ((*p <= 'f') && (*p >= 'a'))
k|=(*p-'a'+10);
else if ((*p <= 'F') && (*p >= 'A'))
k|=(*p-'A'+10);
else
{
fputs("Bad hex key\n",stderr);
Exit=9;
goto problems;
}
p++;
if (i < 8)
kk[i]=k;
else
k2[i-8]=k;
}
des_set_key((C_Block *)k2,ks2);
memset(k2,0,sizeof(k2));
}
else if (longk || flag3)
{
if (flag3)
{
des_string_to_2keys(key,(C_Block *)kk,(C_Block *)k2);
des_set_key((C_Block *)k2,ks2);
memset(k2,0,sizeof(k2));
}
else
des_string_to_key(key,(C_Block *)kk);
}
else
for (i=0; i<KEYSIZ; i++)
{
l=0;
k=key[i];
for (j=0; j<8; j++)
{
if (k&1) l++;
k>>=1;
}
if (l & 1)
kk[i]=key[i]&0x7f;
else
kk[i]=key[i]|0x80;
}
des_set_key((C_Block *)kk,ks);
memset(key,0,sizeof(key));
memset(kk,0,sizeof(kk));
/* woops - A bug that does not showup under unix :-( */
memset(iv,0,sizeof(iv));
memset(iv2,0,sizeof(iv2));
l=1;
rem=0;
/* first read */
if (eflag || (!dflag && cflag))
{
for (;;)
{
num=l=fread(&(buf[rem]),1,BUFSIZE,DES_IN);
l+=rem;
num+=rem;
if (l < 0)
{
perror("read error");
Exit=6;
goto problems;
}
rem=l%8;
len=l-rem;
if (feof(DES_IN))
{
srandom((unsigned int)time(NULL));
for (i=7-rem; i>0; i--)
buf[l++]=random()&0xff;
buf[l++]=rem;
ex=1;
len+=rem;
}
else
l-=rem;
if (cflag)
{
des_cbc_cksum((C_Block *)buf,(C_Block *)cksum,
(long)len,ks,(C_Block *)cksum);
if (!eflag)
{
if (feof(DES_IN)) break;
else continue;
}
}
if (bflag && !flag3)
for (i=0; i<l; i+=8)
des_ecb_encrypt(
(des_cblock *)&(buf[i]),
(des_cblock *)&(obuf[i]),
ks,do_encrypt);
else if (flag3 && bflag)
for (i=0; i<l; i+=8)
des_ecb2_encrypt(
(des_cblock *)&(buf[i]),
(des_cblock *)&(obuf[i]),
ks,ks2,do_encrypt);
else if (flag3 && !bflag)
{
char tmpbuf[8];
if (rem) memcpy(tmpbuf,&(buf[l]),
(unsigned int)rem);
des_3cbc_encrypt(
(des_cblock *)buf,(des_cblock *)obuf,
(long)l,ks,ks2,(des_cblock *)iv,
(des_cblock *)iv2,do_encrypt);
if (rem) memcpy(&(buf[l]),tmpbuf,
(unsigned int)rem);
}
else
{
des_cbc_encrypt(
(des_cblock *)buf,(des_cblock *)obuf,
(long)l,ks,(des_cblock *)iv,do_encrypt);
if (l >= 8) memcpy(iv,&(obuf[l-8]),8);
}
if (rem) memcpy(buf,&(buf[l]),(unsigned int)rem);
i=0;
while (i < l)
{
if (uflag)
j=uufwrite(obuf,1,(unsigned int)l-i,
DES_OUT);
else
j=fwrite(obuf, 1 /* crypto/des/des.c */ local [all...] |
/macosx-10.9.5/apache-786.1/httpd/modules/debug/ |
H A D | mod_dumpio.c | 65 char *obuf; local 68 obuf = malloc(nbytes+1); /* use pool? */ 69 memcpy(obuf, buf, nbytes); 71 ap_xlate_proto_from_ascii(obuf, nbytes); 73 obuf[nbytes] = '\0'; 79 obuf); 80 free(obuf);
|
/macosx-10.9.5/ksh-20/ksh/src/lib/libast/sfio/ |
H A D | sfsetbuf.c | 111 uchar* obuf = NIL(uchar*); local 167 { obuf = f->data; 196 obuf = f->data; 358 if(obuf && size == (size_t)osize && init) 359 { buf = (Void_t*)obuf; 360 obuf = NIL(uchar*); 398 if(obuf && obuf != f->data && osize > 0 && (oflags&SF_MALLOC)) 399 { free((Void_t*)obuf); 400 obuf [all...] |
/macosx-10.9.5/system_cmds-597.90.1/passwd.tproj/ |
H A D | passwd.c | 51 static char obuf[_PASSWORD_LEN+1]; local 71 //strcpy(obuf, p); 72 snprintf( obuf, sizeof(obuf), "%s", p ); 143 *old_clear = obuf;
|
/macosx-10.9.5/system_cmds-597.90.1/system_cmds-597.1.1/passwd.tproj/ |
H A D | passwd.c | 51 static char obuf[_PASSWORD_LEN+1]; local 71 //strcpy(obuf, p); 72 snprintf( obuf, sizeof(obuf), "%s", p ); 143 *old_clear = obuf;
|
/macosx-10.9.5/tcl-102/tcl_ext/tkimg/tkimg/compat/libtiff/tools/ |
H A D | pal2rgb.c | 177 { unsigned char *ibuf, *obuf; local 181 obuf = (unsigned char*)_TIFFmalloc(TIFFScanlineSize(out)); 187 pp = obuf; 193 if (!TIFFWriteScanline(out, obuf, row, 0)) 201 for (pp = obuf, x = 0; x < imagewidth; x++) 203 if (!TIFFWriteScanline(out, obuf, row, 0)) 205 for (pp = obuf, x = 0; x < imagewidth; x++) 207 if (!TIFFWriteScanline(out, obuf, row, 0)) 209 for (pp = obuf, x = 0; x < imagewidth; x++) 211 if (!TIFFWriteScanline(out, obuf, ro [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/ |
H A D | ssl-44-crashes.c | 177 unsigned char ibuf[8], obuf[8]; local 180 SecRandomCopyBytes(kSecRandomDefault, sizeof(obuf), obuf); 181 require_noerr_quiet(ortn = SSLWrite(ctx, obuf, sizeof(obuf), &len), out); 182 require_action_quiet(len == sizeof(obuf), out, ortn = -1);
|
/macosx-10.9.5/screen-22/screen/ |
H A D | braille_tsi.c | 94 char obuf[3],ibuf[20]; local 97 obuf[0] = 0xff; 98 obuf[1] = 0xff; 99 obuf[2] = 0x0a; 101 r = write(bd.bd_fd, obuf, 3);
|
/macosx-10.9.5/shell_cmds-175/script/ |
H A D | script.c | 95 char obuf[BUFSIZ]; local 202 cc = read(master, obuf, sizeof (obuf)); 205 (void)write(STDOUT_FILENO, obuf, cc); 206 (void)fwrite(obuf, 1, cc, fscript);
|
/macosx-10.9.5/text_cmds-87/ed/ |
H A D | cbc.c | 229 * obuf bit pattern 233 expand_des_key(char *obuf, char *kbuf) argument 252 obuf[i] = 273 obuf[i] = (obuf[i]<<1)|nbuf[8*i+j]; 281 (void)strncpy(obuf, kbuf, 8);
|
/macosx-10.9.5/rsync-42/rsync/ |
H A D | token.c | 154 static char *obuf; variable 156 /* We want obuf to be able to hold both MAX_DATA_COUNT+2 bytes as well as 184 if ((obuf = new_array(char, OBUF_SIZE)) == NULL) 231 tx_strm.next_out = (Bytef *)(obuf + 2); 240 obuf+MAX_DATA_COUNT-2, 4); 263 obuf[0] = DEFLATED_DATA + (n >> 8); 264 obuf[1] = n; 265 write_buf(f, obuf, n+2); 285 tx_strm.next_out = (Bytef *) obuf;
|
/macosx-10.9.5/remote_cmds-41.90.1/rlogin.tproj/ |
H A D | rlogin.c | 732 char obuf[4 + sizeof (struct winsize)]; local 734 wp = (struct winsize *)(obuf+4); 735 obuf[0] = 0377; 736 obuf[1] = 0377; 737 obuf[2] = 's'; 738 obuf[3] = 's'; 746 (void)des_write(rem, obuf, sizeof(obuf)); 749 (void)write(rem, obuf, sizeof(obuf)); [all...] |
/macosx-10.9.5/zsh-60/zsh/Src/Zle/ |
H A D | zle_refresh.c | 639 *obuf = NULL; /* old video buffer line-by-line array */ variable 674 zfree(obuf[ln], (winw_alloc + 2) * sizeof(**obuf)); 677 free(obuf); 685 obuf = NULL; 708 obuf = (REFRESH_STRING *)zshcalloc((winh + 1) * sizeof(*obuf)); 710 obuf[0] = (REFRESH_STRING)zalloc((winw + 2) * sizeof(**obuf)); 729 if (obuf[l [all...] |
/macosx-10.9.5/BerkeleyDB-21/db/hash/ |
H A D | hash_upgrade.c | 23 __ham_30_hashmeta(dbp, real_name, obuf) 26 u_int8_t *obuf; 38 oldmeta = (HASHHDR *)obuf;
|